scholarly journals Extended Model of Secure Communication for Embedded Systems with IoT and MQTT

Author(s):  
Peter Peniak ◽  
Maria Franekova
2019 ◽  
Vol 2019 ◽  
pp. 1-11 ◽  
Author(s):  
Soultana Ellinidou ◽  
Gaurav Sharma ◽  
Théo Rigas ◽  
Tristan Vanspouwen ◽  
Olivier Markowitch ◽  
...  

In recent years, Multi-Processor System-on-Chips (MPSoCs) are widely deployed in safety-critical embedded systems. The Cloud-of-Chips (CoC) is a scalable MPSoC architecture comprised of a large number of interconnected Integrated Circuits (IC) and Processing Clusters (PC) destined for critical systems. While many researches have focused on addressing the hardware issues of MPSoCs, the communication over them has not been very well explored. Following the SDN concept, we propose a new protocol in order to secure the communication and efficiently manage the routing within the CoC. The SSPSoC includes a private key derivation phase, a group key agreement (GKA) phase, and a data exchange phase in order to ensure that basic security primitives are preserved and provide secure communication. Furthermore, a network of 1-30 nodes is set in order to validate the proposed protocol and measure the network performance and memory consumption of the proposed protocol.


Author(s):  
Daisuke Tsutsumi ◽  
Isao Ohmura ◽  
Tsukasa Abe ◽  
Hitoshi Yoshimura ◽  
Kiyoshi Inagawa

2021 ◽  
Author(s):  
Prasath J S

Abstract The technologies in monitoring and control of industrial process have changed due to the rapid growth of emerging technologies especially the most popular Internet of Things (IoT). The Internet is an essential part of day-to-day life and it is used to gather more information. The emerging trend in the field of industrial automation is the integration of embedded systems with wireless technologies which enables monitoring of process information through the internet. As the internet is the open environment, a lot of security issues and vulnerabilities arise to the industrial devices. The usage of internet in process monitoring enables attackers to monitor and change the process data. The unsecured industrial operations lead to failure of process equipment and safety issues to plant operators. The security mechanisms are essential in order to protect the embedded systems and wireless networks from unauthorized access. This proposed heterogeneous security algorithm includes symmetric, asymmetric and hash algorithms which strengthen the level of security. The novelty of the proposed work is it employs 128-bit key size for symmetric encryption, 1024-bit key size for asymmetric encryption along with the use of hash algorithm all together strengthens the security and it is tested in real time using embedded system with IoT. It takes less time for execution of data encryption and decryption. This proposed hybrid security algorithm is implemented and tested in an embedded system with wireless monitoring of process information through the internet. It ensures secure communication and monitoring of process data through the internet. The attacker cannot identify and modify the plant information transmitted across internet. This proposed work can be applied to industries dealing with sensitive process information.


1998 ◽  
Vol 3 (3) ◽  
pp. 209-218 ◽  
Author(s):  
André Büssing ◽  
Thomas Bissels

The extended model of different forms of work satisfaction ( Büssing, 1991 ), originally proposed by Bruggemann (1974) , is suggested as a distinctive qualitative approach to work satisfaction. Six forms of work satisfaction—progressive, stabilized, resigned satisfaction, constructive, fixated, resigned dissatisfaction—are derived from the constellation of four constituent variables: comparison of the actual work situation and personal aspirations, global satisfaction, changes in level of aspiration, controllability at work. Preliminary evidence from semi-structured interviews with 46 nurses shows that the dynamic model is headed in the right direction (qualitative differentiation of consistently high propertions of satisfied employees, uncovering processes of person-work situation interaction). Qualitative methods demonstrated their usefulness in accessing underlying cognitive and evaluative processes of the forms, which are often neglected by traditional attitude-based satisfaction research.


2013 ◽  
Vol 221 (4) ◽  
pp. 205-213 ◽  
Author(s):  
Gabriel Horenczyk ◽  
Inga Jasinskaja-Lahti ◽  
David L. Sam ◽  
Paul Vedder

This paper focuses on processes and consequences of intergroup interactions in plural societies, focusing primarily on majority-minority mutuality in acculturation orientations. We examine commonalities and differences among conceptualizations and models addressing issues of mutuality. Our review includes the mutual acculturation model ( Berry, 1997 ), the Interactive Acculturation Model (IAM – Bourhis et al., 1997 ), the Concordance Model of Acculturation (CMA – Piontkowski et al., 2002 ); the Relative Acculturation Extended Model (RAEM – Navas et al., 2005 ), and the work on acculturation discrepancies conducted by Horenczyk (1996 , 2000 ). We also describe a trend toward convergence of acculturation research and the socio-psychological study of intergroup relations addressing issues of mutuality in attitudes, perceptions, and expectations. Our review has the potential to enrich the conceptual and methodological toolbox needed for understanding and investigating acculturation in complex modern societies, where majorities and minorities, immigrants and nationals, are engaged in continuous mutual contact and interaction, affecting each other’s acculturative choices and acculturative expectations.


Sign in / Sign up

Export Citation Format

Share Document